Research Article

Antitamper Image Watermarking Based on Cellular Network Topology for IoT-Themed Mobile Forensics

Figure 7

Tampering localization of cropping attack: (a), (b), (c), (d) for “Pepper”; (e), (f), (g), (h) for “Couple.”